Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Latvia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.140.125.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20566
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.140.125.137.			IN	A

;; AUTHORITY SECTION:
.			402	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024071702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 18 11:15:15 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 137.125.140.94.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.82.98, trying next server
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.125.140.94.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
51.75.146.177 attackspambots
Oct 22 06:51:21 * sshd[31347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.146.177
Oct 22 06:51:24 * sshd[31347]: Failed password for invalid user gerald from 51.75.146.177 port 41514 ssh2
2019-10-22 19:23:35
51.218.145.138 attackspambots
UTC: 2019-10-21 port: 23/tcp
2019-10-22 19:22:01
31.163.147.140 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 19:50:20
49.247.208.209 attack
" "
2019-10-22 19:31:57
151.100.2.90 attackbots
Automatic report - Port Scan
2019-10-22 19:24:39
87.120.246.53 attackspam
email spam
2019-10-22 19:41:17
97.74.24.53 attack
Automatic report - XMLRPC Attack
2019-10-22 19:52:32
181.115.143.40 spamattack
Ok
2019-10-22 19:34:50
190.151.105.182 attack
Oct 22 12:56:56 vps691689 sshd[15727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.151.105.182
Oct 22 12:56:58 vps691689 sshd[15727]: Failed password for invalid user cq from 190.151.105.182 port 46086 ssh2
...
2019-10-22 19:22:20
102.165.33.87 attackbotsspam
UTC: 2019-10-21 port: 22/tcp
2019-10-22 19:20:30
111.254.2.229 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 19:21:25
71.183.100.76 attackspambots
B: zzZZzz blocked content access
2019-10-22 19:51:49
27.5.61.57 attackspambots
Brute force attempt
2019-10-22 19:57:52
218.6.145.32 attack
Portscan or hack attempt detected by psad/fwsnort
2019-10-22 19:25:25
101.89.91.175 attackspam
Oct 22 10:57:11 dev0-dcde-rnet sshd[23217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.91.175
Oct 22 10:57:13 dev0-dcde-rnet sshd[23217]: Failed password for invalid user ftp01 from 101.89.91.175 port 37160 ssh2
Oct 22 11:00:58 dev0-dcde-rnet sshd[23220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.91.175
2019-10-22 19:17:12

Recently Reported IPs

23.225.172.18 23.225.172.7 23.225.183.89 103.0.0.128
144.194.220.255 117.165.211.244 202.137.155.15 111.190.150.40
56.133.18.169 95.117.100.47 35.204.134.143 122.10.138.171
123.24.108.83 123.161.58.100 154.9.235.190 19.131.208.180
253.17.131.203 52.99.83.194 122.37.97.123 3.169.21.45